Edward Coristine, a 19-year-old “senior advisor” to the US State Department and Department of Homeland Security, is under scrutiny due to his controversial past and family history. A new report reveals Coristine, who boasts the nickname “Big Balls,” is the grandson of a KGB officer executed as a double agent. His past includes being fired from a cybersecurity internship for alleged information leaks and connections to cybercrime communities. This lineage and his current position raise concerns about national security given his access to sensitive information.
Read More
Seventeen Cybersecurity and Infrastructure Security Agency (CISA) employees, including ten regional election security specialists, have been placed on administrative leave pending an internal review. This action jeopardizes critical election security support provided to state and local election offices nationwide, impacting vital services such as cybersecurity assessments and training. The review reportedly focuses on efforts to counter foreign interference and disinformation campaigns, raising concerns about the agency’s future given ongoing criticism from Republican officials. State election officials from both parties have voiced strong support for CISA’s election security work.
Read More
A U.S. Treasury intelligence team has identified Elon Musk’s Department of Government Efficiency (DOGE) as the greatest insider threat risk in the agency’s history, citing unauthorized access to sensitive data and system lockouts by DOGE staff. This assessment, following a federal judge’s curtailment of DOGE’s access to Bureau of the Fiscal Service records, prompted a recommendation to immediately suspend all DOGE access to payment systems and conduct a comprehensive review of their actions. The concern stems from reports of unauthorized data changes and the locking out of civil servants, particularly concerning given that DOGE members previously had access to systems processing over $4.7 trillion annually. The team recommends immediate suspension of access and subsequent insider threat monitoring.
Read More
A 23-year-old Elon Musk employee, Luke Farritor, lacks the standard background check required for access to sensitive government systems yet possesses IT access to the Department of Energy, which oversees America’s nuclear weapons, and other agencies including Health and Human Services and USAID. This access, granted despite internal objections, raises significant security and governance concerns due to the potential for unauthorized access to highly sensitive information. The incident has sparked a strong reaction from lawmakers, including demands for increased transparency and investigations into the Department of Government Efficiency (DOGE)’s operations and access to federal systems. The situation highlights broader concerns about DOGE’s scope of authority and the security implications of its practices.
Read More
Energy Secretary Chris Wright granted a SpaceX intern, Luke Farritor, access to the Energy Department’s IT systems despite objections from the department’s general counsel and chief information offices due to Farritor’s lack of security clearance. This access included basic IT services like email and Microsoft 365. Simultaneously, the department is facing significant staffing changes, including potential buyouts for many employees and the planned installation of a SpaceX network security engineer as the new chief information officer. Furthermore, over 1,000 employees, including those in newly created offices focused on infrastructure and climate initiatives, are on probationary status and facing potential immediate termination.
Read More
Government workers at a US agency have reportedly been locked out of their computer systems by aides working for Elon Musk. This situation is deeply concerning, raising serious questions about national security and data privacy. The affected systems include a massive database, the Enterprise Human Resources Integration system, which holds incredibly sensitive information on government employees, including birth dates, Social Security numbers, performance reviews, home addresses, salary details, and years of service.
The lack of transparency surrounding Musk’s aides’ actions is alarming. Government officials have stated that they have no visibility into what these individuals are doing with the computer and data systems, creating significant cybersecurity risks and the potential for hacking.… Continue reading
Finnish investigators have linked the seized tanker Eagle S to damage inflicted upon subsea power and data cables. A seabed drag mark, stretching dozens of kilometers, has been traced to the vessel’s anchor, which is missing. The damaged 170-kilometer power cable connecting Finland and Estonia, severed on December 25th, is the focus of the investigation, alongside disruptions to four data cables. The Eagle S, detained for possible aggravated criminal mischief, is currently anchored near Kilpilahti port while poor weather conditions hinder further investigation.
Read More
A major cybersecurity incident at the US Treasury Department involved a Chinese state-sponsored actor gaining access to several Treasury workstations and unclassified documents via a compromised third-party software provider, BeyondTrust. The intrusion, attributed to a stolen access key, allowed the actor to override security and access departmental user workstations. The compromised service has been taken offline, and investigations are underway with law enforcement and CISA. Treasury officials will brief congressional committees on the breach next week.
Read More
Despite established protocols offering secure government communication systems for presidential transitions, the Trump transition team is utilizing private servers and devices. This decision has raised concerns among federal officials regarding the potential exposure of sensitive government data, particularly given recent cyberattacks targeting key officials. While the team claims to have implemented security measures, the lack of transparency fuels anxieties. This situation contrasts sharply with the intense scrutiny surrounding Hillary Clinton’s email practices during the 2016 election, highlighting a perceived double standard. The use of private emails by the Trump transition underscores a lack of consistent concern regarding cybersecurity protocols in presidential transitions.
Read More
In a significant escalation, US officials confirmed that Chinese hackers compromised at least eight US telecommunications providers, targeting the communications of high-ranking US political figures, including President-elect Trump and members of the Biden administration. While classified information was not accessed, a substantial amount of bulk phone records and, in limited cases, call and text data were stolen. The Biden administration is working with telecom companies, including Verizon and AT&T, to remove the hackers; however, a timeline for completion remains unclear. China denies any involvement.
Read More